Federal Communications Commission Technological Advisory Council
Total Page:16
File Type:pdf, Size:1020Kb
Federal Communications Commission Technological Advisory Council 5G Cybersecurity Subcommittee September 12, 2016 Editor: Tom McGarry [email protected] FCC TAC 5G Cybersecurity Subcommittee Table of Contents Table of Contents ............................................................................................................................ 2 1. Executive Summary .................................................................................................................... 4 2. FCC 2016 activity on 5G ............................................................................................................. 5 FCC Direction to TAC .................................................................................................................. 5 FCC Report and order on 5G ...................................................................................................... 6 3. Security in the 5G environment ................................................................................................... 6 4. Denial of Service (DoS) .............................................................................................................. 7 Recommendations ...................................................................................................................... 8 #1: It is recommended that 5G standards be defined in such a way as to enable resource isolation techniques such as network slicing to confine the effects of DoS attacks .................... 8 #2: It is recommended that 5G networks be able to deauthorize an individual device (or multiple devices) in such a way as the device does not continue to utilize the control plane or media plane resources ........................................................................................................................ 8 #3: It is recommended that base stations have the ability to schedule the radio resource for each device in an unpredictable way ........................................................................................ 8 #4: It is recommended that 5G network elements embed DoS detection and mitigation functions into the RAN functions via key security indicators with related dynamic resolution .... 8 5. Key Management ........................................................................................................................ 9 Recommendations ...................................................................................................................... 9 #5: It is recommended that industry standard encryption techniques be used to protect data during transport ........................................................................................................................ 9 #6: It is recommended that 5G networks provide options for using asymmetric key material to support diverse IoT Use Cases ................................................................................................10 #7: It is recommended that 5G networks enable privacy protections to guard against using key and certificates to identify and track consumers .......................................................................10 #8: It is recommended that 5G standards development consider alternative trust models that enable flexibility in establishing trust models across heterogeneous devices, access technologies, network domains and communication modes .....................................................10 #9: It is recommended that 5G networks support new secure enrollment processes that allow entities other than carriers to provision enrollment certificates to devices ................................11 #10: It is recommended that 5G networks support robust methods for identifying and responding to misbehavior .......................................................................................................12 #11: It is recommended that 5G networks support multiple devices that operate at multiple levels of sensitivity/assurance ..................................................................................................12 6. Identity Management .................................................................................................................12 Recommendations .....................................................................................................................14 Page 2 of 18 FCC TAC 5G Cybersecurity Subcommittee #12: It is recommended that the 5G network that provides access to a device be able to uniquely identify, authenticate and authorize each individual device that accesses the network either directly or indirectly (e.g., via a gateway, virtual network) ...............................................14 #13: It is recommended that an equipment or subscriber identity that is transported across networks and presented to a terminating device be authenticated and authorized ...................14 #14: It is recommended that UE be able to authenticate the network before attaching ............14 #15: It is recommended that Soft SIMs deploy rigorous cybersecurity measures that can protect against attacks aimed at software applications ........................................................................15 7. Isolation Mechanisms ................................................................................................................15 Recommendations .....................................................................................................................15 #16: It is recommended that 5G standards be defined in such a way as to enable resource isolation techniques such as network slicing to enable different levels of security among different resources ...................................................................................................................15 #17: It is recommended that there be access to the control plane and media plane at the base station to enable security monitoring of traffic ..........................................................................16 Acronym List ...................................................................................................................................17 Page 3 of 18 FCC TAC 5G Cybersecurity Subcommittee 1. Executive Summary This document contains draft security-related recommendations intended for 5G standards development activities. TAC members will work these draft recommendations with ATIS PTSC to develop a final list of recommendations for 3GPP. The draft recommendations are: Denial of service o It is recommended that 5G standards be defined in such a way as to enable resource isolation techniques such as network slicing to confine the effects of DoS attacks o It is recommended that 5G networks be able to deauthorize an individual device (or multiple devices) in such a way as the device does not continue to utilize the control plane or media plane resources o It is recommended that base stations have the ability to schedule the radio resource for each device in an unpredictable way o It is recommended that 5G network elements embed DoS detection and mitigation functions into the RAN functions via key security indicators with related dynamic resolution Key management o It is recommended that industry standard encryption techniques be used to protect data during transport o It is recommended that 5G networks provide options for using asymmetric key material to support diverse IoT Use Cases o It is recommended that 5G networks enable privacy protections to guard against using key and certificates to identify and track consumers o It is recommended that 5G standards development consider alternative trust models that enable flexibility in establishing trust models across heterogeneous devices, access technologies, network domains and communication modes o It is recommended that 5G networks support new secure enrollment processes that allow entities other than carriers to provision enrollment certificates to devices o It is recommended that 5G networks support robust methods for identifying and responding to misbehavior o It is recommended that 5G networks support multiple devices that operate at multiple levels of sensitivity/assurance Identity management o It is recommended that the 5G network that provides access to a device be able to uniquely identify, authenticate and authorize each individual device that accesses the network either directly or indirectly (e.g., via a gateway, virtual network) o It is recommended that an equipment or subscriber identity that is transported across networks and presented to a terminating device be authenticated and authorized o It is recommended that UE be able to authenticate the network before attaching o It is recommended that Soft SIMs deploy rigorous cybersecurity measures that can protect against attacks aimed at software applications Isolation mechanisms o It is recommended that 5G standards be defined in such a way as to enable resource isolation techniques such as network slicing to enable different levels of security among different resources o It is recommended that there be access to the control plane and media plane at the base station to enable security monitoring of traffic Page 4 of 18 FCC TAC 5G Cybersecurity Subcommittee 2. FCC 2016 activity on 5G FCC Direction to TAC In 2016 the FCC provided the following directions to the TAC Cybersecurity Working Group: The next evolutionary step in wireless broadband communication, 5G, is expected to support a highly diverse range of new applications, user requirements, and connected devices,